Skip to main content
All CollectionsCreating and running incidentsFAQs
Alerts and automatic incident creation
Alerts and automatic incident creation

Programatically declaring incidents

incident.io Engineering Team avatar
Written by incident.io Engineering Team
Updated over a month ago

Yes! We support automatically creating incidents from many sources including:

To see if we support the source you want, try creating an alert source to see which options are available.

βš™οΈ Can't see the source you want?
You can use our HTTP source to connect with most tools that provide webhooks.

πŸ›  Setting Up

1. Connect an alert source

1️⃣ Create an alert source to receive alerts

2️⃣ Connect your source to receive alerts

  • Follow the steps provided for your chosen source to connect it and receive your first alert

  • You'll see live alerts come in once you start receiving them, you can try sending a test alert from your source to check your configuration

3️⃣ Configure your alerts

When connecting your alert sources to incident.io, you can add custom attributes to provide more context to your alerts. Examples include: team, affected customer, affected feature or environment. This allows you to pull values from your alert payload into rich data on your incidents.

These can provide helpful clues for responders when digging into the alert issue. Plus, it will be a helpful way of grouping and filtering your alerts into incidents via alert routes.

πŸͺ£ Every alert source is rate limited

We apply a rate limit of 120 events/minute for each alert source. This means that if you have two alert sources, we will process up to 240 events every minute.
​
When the rate limit is exceeded, we will respond with an HTTP 429 Too Many Requests.

Organisation-level limits are also applied to ensure reasonable use.


2. Create an alert route

Now that you have an alert source that's receiving alerts, you need to connect it to an alert route to start creating incidents from your alerts.

1️⃣ Select alert sources

  • Select any alert sources which should trigger incidents

  • You can filter which specific alerts should create incidents later

2️⃣ Filter and group

  • Filter and alerts which should not auto-create incidents for (i.e. low priority alerts)

  • Group alerts, so when an alert fires, we find active incidents with similar alerts and give responders the ability to attach the alert to an incident or create a new incident from that alert (ie. grouping alerts by the Team that owns the alert). More on that later.

3️⃣ Configure incidents

  • Choose how you want the incidents created from your alerts to look

  • You can select title and summary from the alert details you have available to you

  • Add any custom fields which should be set based on details on your alert


βš™οΈ How does it work?

Once auto-creation is switched on, incidents will be automatically created in a triage state.
We'll try our best to pull the right people into the incident channel.

When joining a triage incident, you'll be met with this:

πŸ”₯ Accept it
This will accept this triage incident as a real incident.

  • You will be asked if you'd like to rename the incident, and you'll be able to set any custom fields you have configured

  • All your workflows will kick off once the incident is accepted, and you can get to work

  • The incident which triggered this will become an attachment of your incident.

πŸ”— Merge it into another
Was this alert caused by an incident with an existing channel that you already know about?
If so, you can merge the other incident to any open incident channel.
​
The incident that was created in triage will be declined, and the channel will be archived after a short delay.
​

❌ Decline it
Selecting this will decline the incident, and archive the channel.
​
Declined incidents are excluded from any metrics or workflows that you have set up. It's like they never existed at all.


πŸ‘©β€πŸ‘©β€πŸ‘§β€πŸ‘§ Grouping Windows

Sometimes multiple incidents or alerts in a short space of time, are caused by the same underlying problem. To avoid creating unnecessary noise, we recommend configuring a grouping window. This allows us to check in with you before we spin up new incidents automatically.
​
We'll continue to use HTTP source for our example, but the same applies to other alerts and the like:

  1. An incident is auto-created from a HTTP incident
    ​

  2. A second HTTP incident is triggered within the grouping window, with a matching service
    ​

  3. Instead of creating a new incident, we will post the below message in all open incidents with matching HTTP services created within the grouping window.

πŸ”— Merge it into another
This will attach this HTTP incident to the existing incident.

  • Any other grouping suggestion messages will be deleted from other channels, it's unlikely it's linked to multiple incidents
    ​

πŸ‘Ž Decline
This will reject the HTTP incident from this channel, and remove all references to it.
​
If the incident is declined in the channel from all incident channels, we'll archive the channel in 5 minutes.
​

FAQ

What does my deduplication key in my alert payload do in incident.io?

Deduplication keys are one way to indicate that some events are the same alert: If your alert events have the same deduplication key, we won't create new alerts in incident.io for them - if it's different we create a new alert.

Did this answer your question?